Campus Pride Jobs

Mobile Campus Pride Logo

Job Information

Meijer Manager, Info Security Operations in Grand Rapids, Michigan

As a family company, we serve people and communities. When you work at Meijer, you’re provided with career and community opportunities centered around leadership, personal growth and development. Consider joining our family – take care of your career and your community!

Meijer Rewards

  • Weekly pay

  • Scheduling flexibility

  • Paid parental leave

  • Paid education assistance

  • Team member discount

  • Development programs for advancement and career growth

Please review the job profile below and apply today!

This position is responsible for the developing and leading the companies Security Operations Program. This role will continuously develop and lead a cyber security operations team that will monitor the companies assets for any and all security incidents. This position also serves as the lead on cyber events and incident response, ensuring identification, containment and recovery in a manner that protects the company. This role also serves as the primary point of contact for the Chief Information Security Officer during any and all cyber security incidents.

.

What You'll be Doing:

  • Lead the Cyber Incident Response Team when investigating network intrusions and other cyber security incidents to determine the cause and extent of the breach.

  • Manages the overall cyber incident response program. Leverage industry leading frameworks to ensure a pragmatic program is in-place that will allow of validation, identification, containment, eradication and resumption of normal operations in the event of an information security-related issue.

  • Perform non-intrusive host-based and network-based analysis across all major operating systems and network device platforms.

  • Leverage real-time authoritative threat and vulnerability data sources such as National Vulnerability Database and other proprietary services, including zero-day and early warning services to contain cyber security incidents.

  • Summarize events/incidents effectively to different constituencies such as legal counsel, executive management and technical staff, both in written and verbal forms.

  • Knowledge of key trends in cyber security is critical as well as the means to mitigate emerging threats. Must be able to utilize the appropriate people, processes and technologies in order to manage and raise awareness, mitigate and contain potential risks, as determined by potential threat vectors.

  • Ensures appropriate control environments are implemented in order to reduce the likelihood of loss, or minimize the impact in the event of a breach.

  • Must be able to build relationships within the business to identify and protect the most vital information, including intellectual property, customer and key stakeholder information, financial data, sales and marketing data, etc.

  • Leads a team of analysts and engineers responsible for the protection of all endpoints on the network, or otherwise accessing, managing, or manipulating corporate data. Work with key IT stakeholders in order to deploy the most effective logical tools and technologies. This information should feed the SIEM, SOC, and other tools/programs as needed.

  • Build and maintain the Security Operations Center equipped with the appropriately certified and capable individuals that can manage the ever increasing and complex risk landscape. Ensure fusion of threat information utilizing the appropriate tool-sets, with SIEM and the anchor for this technology stack.

  • Deploy and manage all of the necessary technologies and tools to manage the threat environment (including emerging and obscure malicious threats and nefarious actors). End-to-end ownership of the information security technology stack. Responsible for identifying and recommending tools/technologies that are essential to maintaining a suitable control environment.

  • Must be able to quickly correlate security data from security intelligence services, scanners, policy management tools, CMDB, and patch management systems.

  • Dynamically calculate threat score and business impact based on asset criticality and threat criticality.

  • Drill down and analyze vulnerabilities by asset group, threat categories, or other dynamic groupings.

What You Bring with You (Qualifications):

  • Bachelor’s degree in Computer Science, Computer Information Systems, Business Information Systems, Engineering, Information Security, or related discipline or equivalent work experience and technical training is required.

  • An active CISSP Certification Required.

  • 5+ years of related experience responsible for technical services for hardware/software engineering and production support.

  • 6+ years of information security experience.

  • 5+ years experience in IT with a broad range of exposure to business planning, systems analysis, security solutions, application development and infrastructure support.

  • Experience in data administration and security methods plus experience in various database design techniques.

  • Demonstrated ability to deal with and lead in crisis situations; to articulate the problem/issue to senior leadership; and direct resources to address the impending problem.

  • Demonstrated competency in strategic thinking with abilities in relationship management.

  • Successfully developed and implemented new technology.

  • Demonstrated competency in developing effective solutions to diverse and complex business problems.

  • Familiarity with multi-platform environments and their operational/security considerations.

  • Expert knowledge of information systems and operational processes, across all platforms.

  • Ability to relate business requirements and risks to technology implementation for network security.

  • Strong knowledge of business environment, systems architecture and network operations.

  • Knowledge of risk assessment procedures, policy formation, role based authorization methodologies, authentication technologies and security attack pathologies.

  • Technical proficiency in network security related hardware and software.

  • Ability to effectively adapt to rapidly changing network security technology and apply it to business needs.

  • Strong knowledge and understanding of business needs, with the ability to establish and maintain a high level of customer trust.

  • Proven ability to work under pressure in emergencies; flexibility to handle pressure coming from all directions simultaneously.

  • Strong analytical and problem solving skills.

  • Strong customer focus and ability to manage client expectation.

  • Ability to develop and manage efficient and motivated teams across multiple platforms and in varying environments.

  • Confidence and leadership as a member of project teams in a cross functional environment.

  • Excellent oral and written communication skills; ability to present and discuss technical information in a way that establishes rapport, persuades others and gains understanding.

  • Solid project management skills, especially in a cross functional environment.

  • Strong team oriented interpersonal skills; ability to effectively interface with a wide variety of people.

  • Effectiveness in all aspects of the core business skills: analysis, communication, writing, and negotiation.

We opened our doors more than 85 years ago with the goal of helping people provide for themselves and their family. Today we’re a multi-billion dollar retailer with more than 70,000 employees across six states. Our Midwest geography includes corporate offices in Grand Rapids, Michigan, plus manufacturing facilities, distribution centers and over 240 stores across Michigan, Illinois, Indiana, Kentucky, Ohio and Wisconsin.

Meijer is an Equal Opportunity Employer, fostering a diverse and inclusive workplace. We are committed to treating all persons with dignity and respect. Meijer's policy is to not discriminate because of any applicant or team member's race, color, national origin, sex, sexual orientation, gender identity or expression, pregnancy, religion, age, physical or mental disability, uniformed service or veteran status, or any other lawfully-protected classification. If you have a disability and require a reasonable accommodation to complete any part of your application, please click here to submit your request . Submissions that are not seeking help to complete the application due to a disability will not be responded to.

DirectEmployers